Approach high integrity safety security software spark
To see what your friends thought of this book, please sign up. To ask other readers questions about High Integrity Software , please sign up. Be the first to ask a question about High Integrity Software. Lists with This Book. This book is not yet featured on Listopia. Add this book to your favorite list ». Community Reviews. Showing Average rating 3. Rating details. More filters. Sort order. Jul 27, Kevin rated it really liked it. Jacob rated it liked it Feb 25, Ken Horne rated it liked it Dec 17, Nikhil marked it as to-read Jul 23, Arto Bendiken marked it as to-read Sep 04, Chris marked it as to-read Sep 18, Miaisageek added it Jul 13, NCSP , N.
Nielson, F. Springer, New York Polyspace, PolySpace-Technologies. Seo, S. In: Ohori, A. Stark, J. In: Flener, P. An earlier version is available from the Dept. Visser, E. System Description of Stratego 0. Whiting, L. Download references. Andrew Ireland, Bill J.
You can also search for this author in PubMed Google Scholar. Correspondence to Andrew Ireland. Reprints and Permissions.
J Autom Reasoning 36, — Download citation. Published : 29 September Issue Date : April Anyone you share the following link with will be able to read this content:. Sorry, a shareable link is not currently available for this article. Provided by the Springer Nature SharedIt content-sharing initiative.
Skip to main content. Search SpringerLink Search. Abstract Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. References 1. Portland, Oregon 2. Addison-Wesley, Boston, Massachusetts 3. Academic, Boston, Massachusetts 8. In: POPL-4 a SE 26 8 , — Google Scholar View author publications.
The approach has been successfully tested on industrial data. Documents: Advanced Search Include Citations. Authors: Advanced Search Include Citations.
0コメント